Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ========================== AUTO DUMP ANALYZER ==========================
- Auto Dump Analyzer
- Version: 0.91
- Time to analyze file(s): 00 hours and 01 minutes and 03 seconds
- ================================= BIOS =================================
- VENDOR: American Megatrends Inc.
- VERSION: P1.30
- DATE: 05/25/2018
- ============================= MOTHERBOARD ==============================
- MANUFACTURER: ASRock
- PRODUCT: B360 Pro4
- ================================= RAM ==================================
- Size Speed Manufacturer Part No.
- -------------- -------------- ------------------- ----------------------
- 8192MB 2400MHz 8313 CL16-16-16 D4-2400
- 0MHz
- 8192MB 2400MHz 8313 CL16-16-16 D4-2400
- 0MHz
- ================================= CPU ==================================
- Processor Version: Intel(R) Core(TM) i5-8400 CPU @ 2.80GHz
- COUNT: 6
- MHZ: 2808
- VENDOR: GenuineIntel
- FAMILY: 6
- MODEL: 9e
- STEPPING: a
- MICROCODE: 6,9e,a,0 (F,M,S,R) SIG: B4'00000000 (cache) B4'00000000 (init)
- ================================== OS ==================================
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 19041.1.amd64fre.vb_release.191206-1406
- BUILD_VERSION: 10.0.19041.388 (WinBuild.160101.0800)
- BUILD: 19041
- SERVICEPACK: 388
- PLATFORM_TYPE: x64
- NAME: Windows 10
- EDITION: Windows 10 WinNt TerminalServer SingleUserTS
- BUILD_TIMESTAMP: unknown_date
- BUILDDATESTAMP: 160101.0800
- BUILDLAB: WinBuild
- BUILDOSVER: 10.0.19041.388
- =============================== DEBUGGER ===============================
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- =============================== COMMENTS ===============================
- * Information gathered from different dump files may be different. If
- Windows updates between two dump files, two or more OS versions may
- be shown above.
- * If the user updates the BIOS between dump files, two or more versions
- and dates may be shown above.
- * More RAM information can be found below in a full BIOS section.
- ========================================================================
- ======================= Dump #1: ANALYZE VERBOSE =======================
- ====================== File: 072420-19921-01.dmp =======================
- ========================================================================
- Mini Kernel Dump File: Only registers and stack trace are available
- Windows 10 Kernel Version 19041 MP (6 procs) Free x64
- Kernel base = 0xfffff806`43200000 PsLoadedModuleList = 0xfffff806`43e2a310
- Debug session time: Thu Jul 23 16:24:57.780 2020 (UTC - 4:00)
- System Uptime: 0 days 1:04:22.539
- BugCheck 1000007E, {ffffffffc0000005, fffff80646e4d744, ffff9202e9ad6b38, ffff9202e9ad6370}
- *** WARNING: Unable to verify timestamp for vsdatant.sys
- *** ERROR: Module load completed but symbols could not be loaded for vsdatant.sys
- *** WARNING: Unable to verify timestamp for win32k.sys
- *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
- Probably caused by : memory_corruption
- Followup: memory_corruption
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff80646e4d744, The address that the exception occurred at
- Arg3: ffff9202e9ad6b38, Exception Record Address
- Arg4: ffff9202e9ad6370, Context Record Address
- Debugging Details:
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- DUMP_TYPE: 2
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- FAULTING_IP:
- NETIO!StreamInvokeCalloutAndNormalizeAction+5c
- fffff806`46e4d744 488b4808 mov rcx,qword ptr [rax+8]
- EXCEPTION_RECORD: ffff9202e9ad6b38 -- (.exr 0xffff9202e9ad6b38)
- ExceptionAddress: fffff80646e4d744 (NETIO!StreamInvokeCalloutAndNormalizeAction+0x000000000000005c)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: 0000000000000008
- Attempt to read from address 0000000000000008
- CONTEXT: ffff9202e9ad6370 -- (.cxr 0xffff9202e9ad6370)
- rax=0000000000000000 rbx=ffff9202e9ad6ee8 rcx=ffff9202e9ad6ee8
- rdx=ffffe78414d92010 rsi=ffff9202e9ad6eb0 rdi=ffffe78414d92010
- rip=fffff80646e4d744 rsp=ffff9202e9ad6d70 rbp=ffff9202e9ad6de9
- r8=ffffe78414d92010 r9=00000000000005a0 r10=ffffe784132889b0
- r11=0000000000000000 r12=0000000000000000 r13=ffff9202e9ad71d0
- r14=ffff9202e9ad7690 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
- NETIO!StreamInvokeCalloutAndNormalizeAction+0x5c:
- fffff806`46e4d744 488b4808 mov rcx,qword ptr [rax+8] ds:002b:00000000`00000008=????????????????
- Resetting default scope
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: 0000000000000008
- FOLLOWUP_IP:
- NETIO!StreamInvokeCalloutAndNormalizeAction+5c
- fffff806`46e4d744 488b4808 mov rcx,qword ptr [rax+8]
- READ_ADDRESS: fffff80643efa388: Unable to get MiVisibleState
- 0000000000000008
- BUGCHECK_STR: AV
- DEFAULT_BUCKET_ID: CODE_CORRUPTION
- LAST_CONTROL_TRANSFER: from fffff80646e4d458 to fffff80646e4d744
- STACK_TEXT:
- ffff9202`e9ad6d70 fffff806`46e4d458 : ffff9202`e9ad71d0 ffffe784`14d92010 00000000`00000000 ffffe784`14d92010 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x5c
- ffff9202`e9ad6e40 fffff806`46e4cad6 : ffffe784`09ec0014 fffff806`5be6c1f0 00000000`00000002 ffffe784`120ac9e0 : NETIO!StreamProcessCallout+0x3fc
- ffff9202`e9ad6f70 fffff806`46e4953b : 00000004`00000014 ffffe784`120ac9e0 ffffe784`15e6e1c0 ffff9202`e9ad7690 : NETIO!ProcessCallout+0x706
- ffff9202`e9ad70f0 fffff806`46e480da : ffffe784`16768760 ffffe784`09f47960 00000000`00000000 ffffe784`00000000 : NETIO!ArbitrateAndEnforce+0x71b
- ffff9202`e9ad7250 fffff806`46e9a02a : ffffe784`12fc8040 ffff9202`e9ad7711 ffffe784`132889b0 ffffe784`13e82d00 : NETIO!KfdClassify+0x37a
- ffff9202`e9ad7640 fffff806`46e99a4f : 00000000`00000000 ffff9202`e9ad77e1 00000000`000005a0 00000000`00000000 : NETIO!StreamInternalClassify+0x106
- ffff9202`e9ad7760 fffff806`46e9690b : 00000000`00000014 ffffe784`15e6e010 00000000`00000000 ffffe784`13e82da0 : NETIO!StreamInject+0x253
- ffff9202`e9ad7830 fffff806`4722a1fd : ffffe784`15e6e010 00000000`00000106 00000000`00000000 fffff806`00000001 : NETIO!FwppStreamInject+0x13b
- ffff9202`e9ad78c0 fffff806`5983c9cf : ffffe784`1620d5a0 00000000`000005a0 ffffe784`13e82da0 00000000`00000000 : fwpkclnt!FwpsStreamInjectAsync0+0xfd
- ffff9202`e9ad7920 ffffe784`1620d5a0 : 00000000`000005a0 ffffe784`13e82da0 00000000`00000000 00000000`00000106 : vsdatant+0xc9cf
- ffff9202`e9ad7928 00000000`000005a0 : ffffe784`13e82da0 00000000`00000000 00000000`00000106 00000000`00000014 : 0xffffe784`1620d5a0
- ffff9202`e9ad7930 ffffe784`13e82da0 : 00000000`00000000 00000000`00000106 00000000`00000014 fffff806`00000001 : 0x5a0
- ffff9202`e9ad7938 00000000`00000000 : 00000000`00000106 00000000`00000014 fffff806`00000001 ffffe784`13e82da0 : 0xffffe784`13e82da0
- CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
- fffff806435467b5-fffff806435467b6 2 bytes - nt!MiDeleteNonPagedPoolTail+45
- [ 80 fa:00 f9 ]
- fffff80643584f3e-fffff80643584f41 4 bytes - nt!MiFreeUltraMapping+32 (+0x3e789)
- [ a0 7d fb f6:80 21 43 86 ]
- 6 errors : !nt (fffff806435467b5-fffff80643584f41)
- MODULE_NAME: memory_corruption
- IMAGE_NAME: memory_corruption
- FOLLOWUP_NAME: memory_corruption
- DEBUG_FLR_IMAGE_TIMESTAMP: 0
- MEMORY_CORRUPTOR: LARGE
- STACK_COMMAND: .cxr 0xffff9202e9ad6370 ; kb
- FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
- BUCKET_ID: MEMORY_CORRUPTION_LARGE
- PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE
- TARGET_TIME: 2020-07-23T20:24:57.000Z
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- USER_LCID: 0
- FAILURE_ID_HASH_STRING: km:memory_corruption_large
- FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
- Followup: memory_corruption
- ====================== Dump #1: 3RD PARTY DRIVERS ======================
- May 05 2007 - klwtp.sys - Kaspersky WFP Network Connection Filter Driver https://www.kaspersky.com/
- Jan 07 2015 - klim6.sys - Kaspersky Lab Intermediate Network Driver https://www.kaspersky.com/
- Sep 13 2016 - RTKVHD64.sys - Realtek Audio System driver https://www.realtek.com/en/
- Mar 11 2017 - vsdatant.sys - ZoneAlarm Anti-Virus http://www.zonealarm.com/
- Dec 19 2018 - idmwfp.sys - Internet Download Manager WFP driver (Tonec Inc.)
- Jan 22 2019 - klupd_klif_kimul.sys - Kaspersky Kernel Heuristics Engine https://www.kaspersky.com/
- Feb 15 2019 - cm_km.sys - Kaspersky Cryptographic Module Driver
- Feb 26 2019 - klwfp.sys - Kaspersky Network filtering component https://www.kaspersky.com/
- Feb 27 2019 - epregflt.sys - Endpoint Security Registry Filter driver (Check Point Software Tech)
- Apr 04 2019 - TeeDriverW8x64.sys - Intel Management Engine Interface driver https://downloadcenter.intel.com/
- May 07 2019 - e1d68x64.sys - Intel(R) Gigabit Adapter driver
- Oct 06 2019 - epnetflt.sys - Endpoint Security Network Filter driver (Check Point Software Tech)
- Oct 06 2019 - epklib.sys - Endpoint Security driver (Check Point Software Tech)
- Oct 23 2019 - CPEPMon.sys - Endpoint Security Monitor driver (Check Point Software Tech)
- Oct 31 2019 - cpbak.sys - Endpoint Security driver (Check Point Software Tech)
- Mar 13 2020 - klif.sys - Kaspersky Lab Intruder Filter driver https://www.kaspersky.com/
- Mar 20 2020 - klupd_klif_klark.sys - Kaspersky https://www.kaspersky.com/
- Mar 20 2020 - klupd_klif_mark.sys - Kaspersky Lab Anti-Rootkit Engine https://www.kaspersky.com
- Mar 22 2020 - 8D97ADB53C41E0C429ADEE347001660D.sys -
- Mar 24 2020 - nvlddmkm.sys - Nvidia Graphics Card driver http://www.nvidia.com/
- Apr 28 2020 - klgse.sys - Kaspersky Security Extender driver
- Apr 28 2020 - klhk.sys - Kaspersky Lab service driver https://www.kaspersky.com/
- Jun 11 2020 - klids.sys - Kaspersky Lab IDS Engine https://www.kaspersky.com/
- Mar 13 2029 - klpd.sys - Kaspersky Format Recognizer https://www.kaspersky.com/
- Aug 13 2029 - klflt.sys - Kaspersky Filter Core https://www.kaspersky.com/
- Apr 21 2030 - klkbdflt2.sys - Kaspersky Lab Light Keyboard Device Filter driver
- ***** Invalid (B1F414C8) - kldisk.sys - Kaspersky Virtual Disk driver https://www.kaspersky.com/
- ***** Invalid (E34C73F4) - kneps.sys - Kaspersky KNEPS Power https://www.kaspersky.com/
- ================== Dump #1: 3RD PARTY DRIVERS (FULL) ===================
- Image path: \SystemRoot\system32\DRIVERS\klwtp.sys
- Image name: klwtp.sys
- Search : https://www.google.com/search?q=klwtp.sys
- ADA Info : Kaspersky WFP Network Connection Filter Driver https://www.kaspersky.com/
- Timestamp : Sat May 5 2007
- Image path: \SystemRoot\system32\DRIVERS\klim6.sys
- Image name: klim6.sys
- Search : https://www.google.com/search?q=klim6.sys
- ADA Info : Kaspersky Lab Intermediate Network Driver https://www.kaspersky.com/
- Timestamp : Wed Jan 7 2015
- Image path: \SystemRoot\system32\drivers\RTKVHD64.sys
- Image name: RTKVHD64.sys
- Search : https://www.google.com/search?q=RTKVHD64.sys
- ADA Info : Realtek Audio System driver https://www.realtek.com/en/
- Timestamp : Tue Sep 13 2016
- Image path: \SystemRoot\System32\drivers\vsdatant.sys
- Image name: vsdatant.sys
- Search : https://www.google.com/search?q=vsdatant.sys
- ADA Info : ZoneAlarm Anti-Virus http://www.zonealarm.com/
- Timestamp : Sat Mar 11 2017
- Image path: \SystemRoot\system32\DRIVERS\idmwfp.sys
- Image name: idmwfp.sys
- Search : https://www.google.com/search?q=idmwfp.sys
- ADA Info : Internet Download Manager WFP driver (Tonec Inc.)
- Timestamp : Wed Dec 19 2018
- Image path: \SystemRoot\System32\Drivers\klupd_klif_kimul.sys
- Image name: klupd_klif_kimul.sys
- Search : https://www.google.com/search?q=klupd_klif_kimul.sys
- ADA Info : Kaspersky Kernel Heuristics Engine https://www.kaspersky.com/
- Timestamp : Tue Jan 22 2019
- Image path: \SystemRoot\system32\DRIVERS\cm_km.sys
- Image name: cm_km.sys
- Search : https://www.google.com/search?q=cm_km.sys
- ADA Info : Kaspersky Cryptographic Module Driver
- Timestamp : Fri Feb 15 2019
- Image path: \SystemRoot\system32\DRIVERS\klwfp.sys
- Image name: klwfp.sys
- Search : https://www.google.com/search?q=klwfp.sys
- ADA Info : Kaspersky Network filtering component https://www.kaspersky.com/
- Timestamp : Tue Feb 26 2019
- Image path: \??\C:\Windows\system32\drivers\epregflt.sys
- Image name: epregflt.sys
- Search : https://www.google.com/search?q=epregflt.sys
- ADA Info : Endpoint Security Registry Filter driver (Check Point Software Tech)
- Timestamp : Wed Feb 27 2019
- Image path: \SystemRoot\System32\DriverStore\FileRepository\heci.inf_amd64_85021432489d6a1c\x64\TeeDriverW8x64.sys
- Image name: TeeDriverW8x64.sys
- Search : https://www.google.com/search?q=TeeDriverW8x64.sys
- ADA Info : Intel Management Engine Interface driver https://downloadcenter.intel.com/
- Timestamp : Thu Apr 4 2019
- Image path: \SystemRoot\System32\DriverStore\FileRepository\e1d68x64.inf_amd64_546eef898d5d49f9\e1d68x64.sys
- Image name: e1d68x64.sys
- Search : https://www.google.com/search?q=e1d68x64.sys
- ADA Info : Intel(R) Gigabit Adapter driver
- Timestamp : Tue May 7 2019
- Image path: \??\C:\Windows\system32\drivers\epnetflt.sys
- Image name: epnetflt.sys
- Search : https://www.google.com/search?q=epnetflt.sys
- ADA Info : Endpoint Security Network Filter driver (Check Point Software Tech)
- Timestamp : Sun Oct 6 2019
- Image path: \SystemRoot\system32\DRIVERS\epklib.sys
- Image name: epklib.sys
- Search : https://www.google.com/search?q=epklib.sys
- ADA Info : Endpoint Security driver (Check Point Software Tech)
- Timestamp : Sun Oct 6 2019
- Image path: \SystemRoot\system32\DRIVERS\CPEPMon.sys
- Image name: CPEPMon.sys
- Search : https://www.google.com/search?q=CPEPMon.sys
- ADA Info : Endpoint Security Monitor driver (Check Point Software Tech)
- Timestamp : Wed Oct 23 2019
- Image path: \SystemRoot\system32\DRIVERS\cpbak.sys
- Image name: cpbak.sys
- Search : https://www.google.com/search?q=cpbak.sys
- ADA Info : Endpoint Security driver (Check Point Software Tech)
- Timestamp : Thu Oct 31 2019
- Image path: \SystemRoot\system32\DRIVERS\klif.sys
- Image name: klif.sys
- Search : https://www.google.com/search?q=klif.sys
- ADA Info : Kaspersky Lab Intruder Filter driver https://www.kaspersky.com/
- Timestamp : Fri Mar 13 2020
- Image path: \SystemRoot\System32\Drivers\klupd_klif_klark.sys
- Image name: klupd_klif_klark.sys
- Search : https://www.google.com/search?q=klupd_klif_klark.sys
- ADA Info : Kaspersky https://www.kaspersky.com/
- Timestamp : Fri Mar 20 2020
- Image path: \SystemRoot\System32\Drivers\klupd_klif_mark.sys
- Image name: klupd_klif_mark.sys
- Search : https://www.google.com/search?q=klupd_klif_mark.sys
- ADA Info : Kaspersky Lab Anti-Rootkit Engine https://www.kaspersky.com
- Timestamp : Fri Mar 20 2020
- Image path: \??\C:\Users\saurav\AppData\Local\Temp\{D1EA06B5-BFC7-458A-B3B7-F9849DEB866A}\8D97ADB53C41E0C429ADEE347001660D.sys
- Image name: 8D97ADB53C41E0C429ADEE347001660D.sys
- Search : https://www.google.com/search?q=8D97ADB53C41E0C429ADEE347001660D.sys
- Timestamp : Sun Mar 22 2020
- Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_5287c583fc2a7e41\nvlddmkm.sys
- Image name: nvlddmkm.sys
- Search : https://www.google.com/search?q=nvlddmkm.sys
- ADA Info : Nvidia Graphics Card driver http://www.nvidia.com/
- Timestamp : Tue Mar 24 2020
- Image path: \SystemRoot\system32\DRIVERS\klgse.sys
- Image name: klgse.sys
- Search : https://www.google.com/search?q=klgse.sys
- ADA Info : Kaspersky Security Extender driver
- Timestamp : Tue Apr 28 2020
- Image path: \SystemRoot\system32\DRIVERS\klhk.sys
- Image name: klhk.sys
- Search : https://www.google.com/search?q=klhk.sys
- ADA Info : Kaspersky Lab service driver https://www.kaspersky.com/
- Timestamp : Tue Apr 28 2020
- Image path: \??\C:\ProgramData\Kaspersky Lab\AVP20.0\Bases\klids.sys
- Image name: klids.sys
- Search : https://www.google.com/search?q=klids.sys
- ADA Info : Kaspersky Lab IDS Engine https://www.kaspersky.com/
- Timestamp : Thu Jun 11 2020
- Image path: \SystemRoot\system32\DRIVERS\klpd.sys
- Image name: klpd.sys
- Search : https://www.google.com/search?q=klpd.sys
- ADA Info : Kaspersky Format Recognizer https://www.kaspersky.com/
- Timestamp : Tue Mar 13 2029
- Image path: \SystemRoot\system32\DRIVERS\klflt.sys
- Image name: klflt.sys
- Search : https://www.google.com/search?q=klflt.sys
- ADA Info : Kaspersky Filter Core https://www.kaspersky.com/
- Timestamp : Mon Aug 13 2029
- Image path: \SystemRoot\system32\DRIVERS\klkbdflt2.sys
- Image name: klkbdflt2.sys
- Search : https://www.google.com/search?q=klkbdflt2.sys
- ADA Info : Kaspersky Lab Light Keyboard Device Filter driver
- Timestamp : Sun Apr 21 2030
- Image path: \SystemRoot\system32\DRIVERS\kldisk.sys
- Image name: kldisk.sys
- Search : https://www.google.com/search?q=kldisk.sys
- ADA Info : Kaspersky Virtual Disk driver https://www.kaspersky.com/
- Timestamp : ***** Invalid (B1F414C8)
- Image path: \SystemRoot\system32\DRIVERS\kneps.sys
- Image name: kneps.sys
- Search : https://www.google.com/search?q=kneps.sys
- ADA Info : Kaspersky KNEPS Power https://www.kaspersky.com/
- Timestamp : ***** Invalid (E34C73F4)
- ====================== Dump #1: MICROSOFT DRIVERS ======================
- ACPI.sys ACPI Driver for NT (Microsoft)
- acpiex.sys ACPIEx Driver (Microsoft)
- acpipagr.sys ACPI Processor Aggregator Device driver (Microsoft)
- afd.sys Ancillary Function Driver for WinSock (Microsoft)
- afunix.sys AF_UNIX Socket Provider driver (Microsoft)
- AgileVpn.sys RAS Agil VPN Miniport Call Manager driver (Microsoft)
- ahcache.sys Application Compatibility Cache (Microsoft)
- bam.sys BAM Kernal driver (Microsoft)
- BasicDisplay.sys Basic Display driver (Microsoft)
- BasicRender.sys Basic Render driver (Microsoft)
- Beep.SYS BEEP driver (Microsoft)
- bindflt.sys Windows Bind Filter driver (Microsoft)
- BOOTVID.dll VGA Boot Driver (Microsoft)
- bowser.sys NT Lan Manager Datagram Receiver Driver (Microsoft)
- cdd.dll Canonical Display Driver (Microsoft)
- cdrom.sys SCSI CD-ROM Driver (Microsoft)
- CEA.sys Event Aggregation Kernal Mode Library (Microsoft)
- CI.dll Code Integrity Module (Microsoft)
- CimFS.SYS Consumer IR Class Driver for eHome (Microsoft)
- CLASSPNP.SYS SCSI Class System Dll (Microsoft)
- cldflt.sys Cloud Files Mini Filter driver (Microsoft)
- CLFS.SYS Common Log File System Driver (Microsoft)
- clipsp.sys CLIP Service (Microsoft)
- cmimcext.sys Kernal Configuration Manager Initial Con. Driver (Microsoft)
- cng.sys Kernal Cryptography, Next Generation Driver (Microsoft)
- CompositeBus.sys Multi-Transport Composite Bus Enumerator (Microsoft)
- condrv.sys Console Driver (Microsoft)
- crashdmp.sys Crash Dump driver (Microsoft)
- csc.sys Windows Client Side Caching driver (Microsoft)
- dfsc.sys DFS Namespace Client Driver (Microsoft)
- disk.sys PnP Disk Driver (Microsoft)
- drmk.sys Digital Rights Management (DRM) driver (Microsoft)
- dump_diskdump.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dump_dumpfve.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dump_storahci.sys (Generic Description) dump_*.sys drivers usually provide disk access during a crash to write dump files.
- dxgkrnl.sys DirectX Graphics Kernal (Microsoft)
- dxgmms2.sys DirectX Graphics MMS
- fastfat.SYS Fast FAT File System Driver (Microsoft)
- filecrypt.sys Windows sandboxing and encryption filter (Microsoft)
- fileinfo.sys FileInfo Filter Driver (Microsoft)
- FLTMGR.SYS Filesystem Filter Manager (Microsoft)
- Fs_Rec.sys File System Recognizer Driver (Microsoft)
- fvevol.sys BitLocker Driver Encryption Driver (Microsoft)
- fwpkclnt.sys FWP/IPsec Kernal-Mode API (Microsoft)
- gpuenergydrv.sys GPU Energy Kernal Driver (Microsoft)
- hal.dll Hardware Abstraction Layer DLL (Microsoft)
- HDAudBus.sys High Definition Audio Bus Driver (Microsoft)
- HdAudio.sys High Definition Audio Function driver (Microsoft)
- HIDCLASS.SYS Hid Class Library (Microsoft)
- HIDPARSE.SYS Hid Parsing Library (Microsoft)
- hidusb.sys USB Miniport Driver for Input Devices (Microsoft)
- HTTP.sys HTTP Protocol Stack (Microsoft)
- intelpep.sys Intel Power Engine Plugin (Microsoft)
- intelppm.sys Processor Device Driver (Microsoft)
- IntelTA.sys Intel Telemetry Driver
- iorate.sys I/O rate control Filter (Microsoft)
- kbdclass.sys Keyboard Class Driver (Microsoft)
- kbdhid.sys HID Mouse Filter Driver or HID Keyboard Filter Driver (Microsoft)
- kd.dll Local Kernal Debugger (Microsoft)
- kdnic.sys Microsoft Kernel Debugger Network Miniport (Microsoft)
- ks.sys Kernal CSA Library (Microsoft)
- ksecdd.sys Kernel Security Support Provider Interface (Microsoft)
- ksecpkg.sys Kernel Security Support Provider Interface Packages (Microsoft)
- ksthunk.sys Kernal Streaming WOW Thunk Service (Microsoft)
- lltdio.sys Link-Layer Topology Mapper I/O Driver (Microsoft)
- luafv.sys LUA File Virtualization Filter Driver (Microsoft)
- mcupdate_GenuineIntel.dll Intel Microcode Update Library (Microsoft)
- mmcss.sys MMCSS Driver (Microsoft)
- monitor.sys Monitor Driver (Microsoft)
- mouclass.sys Mouse Class Driver (Microsoft)
- mouhid.sys HID Mouse Filter Driver (Microsoft)
- mountmgr.sys Mount Point Manager (Microsoft)
- mpsdrv.sys Microsoft Protection Service Driver (Microsoft)
- mrxsmb.sys SMB MiniRedirector Wrapper and Engine (Microsoft)
- mrxsmb20.sys Longhorn SMB 2.0 Redirector (Microsoft)
- Msfs.SYS Mailslot driver (Microsoft)
- msisadrv.sys ISA Driver (Microsoft)
- mslldp.sys Microsoft Link-Layer Discovery Protocol... (Microsoft)
- msquic.sys Windows QUIC Driver
- msrpc.sys Kernel Remote Procedure Call Provider (Microsoft)
- mssecflt.sys Microsoft Security Events Component file system filter driver (Microsoft)
- mssmbios.sys System Management BIOS driver (Microsoft)
- mup.sys Multiple UNC Provider driver (Microsoft)
- ndis.sys Network Driver Interface Specification (NDIS) driver (Microsoft)
- ndiscap.sys Microsoft NDIS Packet Capture Filter Driver
- ndistapi.sys NDIS 3.0 Connection Wrapper driver (Microsoft)
- NdisVirtualBus.sys Virtual Network Adapter Enumerator (Microsoft)
- ndiswan.sys MS PPP Framing Driver (Strong Encryption) Microsoft)
- NDProxy.sys NDIS Proxy driver (Microsoft)
- Ndu.sys Network Data Usage Monitoring driver (Microsoft)
- netbios.sys NetBIOS Interface driver (Microsoft)
- netbt.sys MBT Transport driver (Microsoft)
- NETIO.SYS Network I/O Subsystem (Microsoft)
- Npfs.SYS NPFS driver (Microsoft)
- npsvctrig.sys Named pipe service triggers (Microsoft)
- nsiproxy.sys NSI Proxy driver (Microsoft)
- Ntfs.sys NT File System Driver (Microsoft)
- ntkrnlmp.exe Windows NT operating system kernel (Microsoft)
- ntosext.sys NTOS Extension Host driver (Microsoft)
- Null.SYS NULL Driver (Microsoft)
- pacer.sys QoS Packet Scheduler (Microsoft)
- partmgr.sys Partition driver (Microsoft)
- pci.sys NT Plug and Play PCI Enumerator (Microsoft)
- pcw.sys Performance Counter Driver (Microsoft)
- pdc.sys Power Dependency Coordinator Driver (Microsoft)
- peauth.sys Protected Environment Authentication and Authorization Export Driver (Microsoft)
- portcls.sys Class Driver for Port/Miniport Devices system driver (Microsoft)
- PSHED.dll Platform Specific Hardware Error driver (Microsoft)
- rasl2tp.sys RAS L2TP Mini-port/Call-manager driver (Microsoft)
- raspppoe.sys RAS PPPoE Mini-port/Call manager driver (Microsoft)
- raspptp.sys Peer-to-Peer Tunneling Protocol (Microsoft)
- rassstp.sys RAS SSTP Miniport Call Manager driver (Microsoft)
- rdbss.sys Redirected Drive Buffering SubSystem driver (Microsoft)
- rdpbus.sys Microsoft RDP Bus Device driver (Microsoft)
- rdyboost.sys ReadyBoost Driver (Microsoft)
- rspndr.sys Link-Layer Topology Responder driver (Microsoft)
- serenum.sys Serial Port Enumerator (Microsoft)
- serial.sys Serial Device Driver
- SgrmAgent.sys System Guard Runtime Monitor Agent driver (Microsoft)
- SleepStudyHelper.sys Sleep Study Helper driver (Microsoft)
- spaceport.sys Storage Spaces driver (Microsoft)
- srv2.sys Smb 2.0 Server driver (Microsoft)
- srvnet.sys Server Network driver (Microsoft)
- storahci.sys MS AHCI Storport Miniport Driver (Microsoft)
- storport.sys Storage port driver for use with high-performance buses such as fibre channel buses and RAID adapters. (Microsoft)
- storqosflt.sys Storage QoS Filter driver (Microsoft)
- swenum.sys Plug and Play Software Device Enumerator (Microsoft)
- tbs.sys Export driver for kernel mode TPM API (Microsoft)
- tcpip.sys TCP/IP Protocol driver (Microsoft)
- tcpipreg.sys Microsoft Windows TCP/IP Registry Compatibility driver (Microsoft)
- TDI.SYS TDI Wrapper driver (Microsoft)
- tdx.sys NetIO Legacy TDI x-bit Support Driver (Microsoft)
- tm.sys Kernel Transaction Manager driver (Microsoft)
- ucx01000.sys USB Controller Extension (Microsoft)
- UEFI.sys UEFI NT driver (Microsoft)
- umbus.sys User-Mode Bus Enumerator (Microsoft)
- usbccgp.sys USB Common Class Generic Parent Driver (Microsoft)
- USBD.SYS Universal Serial Bus Driver (Microsoft)
- UsbHub3.sys USB3 HUB driver (Microsoft)
- USBSTOR.SYS USB Mass Storage Class driver (Microsoft)
- USBXHCI.SYS USB XHCI driver (Microsoft)
- vdrvroot.sys Virtual Drive Root Enumerator (Microsoft)
- Vid.sys Microsoft Hyper-V Virtualization Infrastructure Driver
- volmgr.sys Volume Manager Driver (Microsoft)
- volmgrx.sys Volume Manager Extension Driver (Microsoft)
- volsnap.sys Volume Shadow Copy driver (Microsoft)
- volume.sys Volume driver (Microsoft)
- vwififlt.sys Virtual WiFi Filter Driver (Microsoft)
- wanarp.sys MS Remote Access and Routing ARP driver (Microsoft)
- watchdog.sys Watchdog driver (Microsoft)
- wcifs.sys Windows Container Isolation FS Filter driver (Microsoft)
- Wdf01000.sys Kernel Mode Driver Framework Runtime (Microsoft)
- WDFLDR.SYS Kernel Mode Driver Framework Loader (Microsoft)
- werkernel.sys Windows Error Reporting Kernel driver (Microsoft)
- wfplwfs.sys WPF NDIS Lightweight Filter driver (Microsoft)
- win32k.sys Full/Desktop Multi-User Win32 driver (Microsoft)
- win32kbase.sys Base Win32k Kernel Driver (Microsoft)
- win32kfull.sys Full/Desktop Win32k Kernel Driver (Microsoft)
- WindowsTrustedRT.sys Windows Trusted Runtime Interface driver (Microsoft)
- WindowsTrustedRTProxy.sys Windows Trusted Runtime Service Proxy driver (Microsoft)
- winhvr.sys Windows Hypervisor Root Interface driver (Microsoft)
- wmiacpi.sys Windows Management Interface for ACPI (Microsoft)
- WMILIB.SYS WMILIB WMI support library DLL (Microsoft)
- Wof.sys Windows Overlay Filter (Microsoft)
- WpdUpFltr.sys Portable Device Upper Class Filter driver (Microsoft)
- WppRecorder.sys WPP Trace Recorder (Microsoft)
- WUDFRd.sys Windows Driver Foundation - User-mode Driver Framework Reflector driver (Microsoft)
- ====================== Dump #1: UNLOADED MODULES =======================
- fffff806`5bf50000 fffff806`5bf89000 klids.sys
- fffff806`5e4b0000 fffff806`5e4be000 kltap.sys
- fffff806`46980000 fffff806`469e8000 WdFilter.sys
- fffff806`5bf50000 fffff806`5bf61000 MpKslDrv.sys
- fffff806`5e340000 fffff806`5e356000 WdNisDrv.sys
- fffff806`5e360000 fffff806`5e38c000 519F781EFCFE
- fffff806`59f90000 fffff806`59f9f000 dump_storpor
- fffff806`59200000 fffff806`59233000 dump_storahc
- fffff806`59260000 fffff806`5927e000 dump_dumpfve
- fffff806`468f0000 fffff806`4690d000 EhStorClass.
- fffff806`59d80000 fffff806`59d9c000 dam.sys
- fffff806`46450000 fffff806`46461000 WdBoot.sys
- fffff806`474d0000 fffff806`474e0000 hwpolicy.sys
- ====================== Dump #1: BIOS INFORMATION =======================
- [SMBIOS Data Tables v3.1]
- [DMI Version - 0]
- [2.0 Calling Convention - No]
- [Table Size - 3252 bytes]
- [BIOS Information (Type 0) - Length 26 - Handle 0000h]
- Vendor American Megatrends Inc.
- BIOS Version P1.30
- BIOS Starting Address Segment f000
- BIOS Release Date 05/25/2018
- BIOS ROM Size 1000000
- BIOS Characteristics
- 07: - PCI Supported
- 11: - Upgradeable FLASH BIOS
- 12: - BIOS Shadowing Supported
- 15: - CD-Boot Supported
- 16: - Selectable Boot Supported
- 17: - BIOS ROM Socketed
- 19: - EDD Supported
- 23: - 1.2MB Floppy Supported
- 24: - 720KB Floppy Supported
- 25: - 2.88MB Floppy Supported
- 26: - Print Screen Device Supported
- 27: - Keyboard Services Supported
- 28: - Serial Services Supported
- 29: - Printer Services Supported
- 32: - BIOS Vendor Reserved
- BIOS Characteristic Extensions
- 00: - ACPI Supported
- 01: - USB Legacy Supported
- 08: - BIOS Boot Specification Supported
- 10: - Specification Reserved
- 11: - Specification Reserved
- BIOS Major Revision 5
- BIOS Minor Revision 13
- EC Firmware Major Revision 255
- EC Firmware Minor Revision 255
- [System Information (Type 1) - Length 27 - Handle 0001h]
- UUID 00000000-0000-0000-0000-000000000000
- Wakeup Type Power Switch
- [BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
- Manufacturer ASRock
- Product B360 Pro4
- Version
- Feature Flags 09h
- 1995224800: - 1995224848: - «?ºù
- Location
- Chassis Handle 0003h
- Board Type 0ah - Processor/Memory Module
- Number of Child Handles 0
- [System Enclosure (Type 3) - Length 22 - Handle 0003h]
- Chassis Type Desktop
- Bootup State Safe
- Power Supply State Safe
- Thermal State Safe
- Security Status None
- OEM Defined 0
- Height 0U
- Number of Power Cords 1
- Number of Contained Elements 0
- Contained Element Size 3
- [OEM Strings (Type 11) - Length 5 - Handle 000ch]
- Number of Strings 1
- [Physical Memory Array (Type 16) - Length 23 - Handle 000fh]
- Location 03h - SystemBoard/Motherboard
- Use 03h - System Memory
- Memory Error Correction 03h - None
- Maximum Capacity 67108864KB
- Number of Memory Devices 4
- [Memory Device (Type 17) - Length 40 - Handle 0010h]
- Physical Memory Array Handle 000fh
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM0
- Bank Locator BANK 0
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2400MHz
- Manufacturer 8313
- Part Number CL16-16-16 D4-2400
- [Memory Device (Type 17) - Length 40 - Handle 0011h]
- Physical Memory Array Handle 000fh
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 09h - DIMM
- Device Locator ChannelA-DIMM1
- Bank Locator BANK 1
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Device (Type 17) - Length 40 - Handle 0012h]
- Physical Memory Array Handle 000fh
- Total Width 64 bits
- Data Width 64 bits
- Size 8192MB
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM0
- Bank Locator BANK 2
- Memory Type 1ah - Specification Reserved
- Type Detail 0080h - Synchronous
- Speed 2400MHz
- Manufacturer 8313
- Part Number CL16-16-16 D4-2400
- [Memory Device (Type 17) - Length 40 - Handle 0013h]
- Physical Memory Array Handle 000fh
- Total Width 0 bits
- Data Width 0 bits
- Form Factor 09h - DIMM
- Device Locator ChannelB-DIMM1
- Bank Locator BANK 3
- Memory Type 02h - Unknown
- Type Detail 0000h -
- Speed 0MHz
- [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0014h]
- Starting Address 00000000h
- Ending Address 00ffffffh
- Memory Array Handle 000fh
- Partition Width 02
- [Cache Information (Type 7) - Length 19 - Handle 001ah]
- Socket Designation L1 Cache
- Cache Configuration 0180h - WB Enabled Int NonSocketed L1
- Maximum Cache Size 0180h - 384K
- Installed Size 0180h - 384K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type ParitySingle-Bit ECC
- System Cache Type Unified
- Associativity 8-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 001bh]
- Socket Designation L2 Cache
- Cache Configuration 0181h - WB Enabled Int NonSocketed L2
- Maximum Cache Size 0600h - 1536K
- Installed Size 0600h - 1536K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Multi-Bit ECC
- System Cache Type Unified
- Associativity 4-way Set-Associative
- [Cache Information (Type 7) - Length 19 - Handle 001ch]
- Socket Designation L3 Cache
- Cache Configuration 0182h - WB Enabled Int NonSocketed L3
- Maximum Cache Size 2400h - 9216K
- Installed Size 2400h - 9216K
- Supported SRAM Type 0020h - Synchronous
- Current SRAM Type 0020h - Synchronous
- Cache Speed 0ns
- Error Correction Type Specification Reserved
- System Cache Type Unified
- Associativity Specification Reserved
- [Processor Information (Type 4) - Length 48 - Handle 001dh]
- Socket Designation CPUSocket
- Processor Type Central Processor
- Processor Family cdh - Specification Reserved
- Processor Manufacturer Intel(R) Corporation
- Processor ID ea060900fffbebbf
- Processor Version Intel(R) Core(TM) i5-8400 CPU @ 2.80GHz
- Processor Voltage 89h - 0.9V
- External Clock 100MHz
- Max Speed 8300MHz
- Current Speed 2800MHz
- Status Enabled Populated
- Processor Upgrade Other
- L1 Cache Handle 001ah
- L2 Cache Handle 001bh
- L3 Cache Handle 001ch
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 001eh]
- Starting Address 00000000h
- Ending Address 007fffffh
- Memory Device Handle 0010h
- Mem Array Mapped Adr Handle 0014h
- Partition Row Position 01
- Interleave Position 01
- Interleave Data Depth 02
- [Memory Device Mapped Address (Type 20) - Length 35 - Handle 001fh]
- Starting Address 00800000h
- Ending Address 00ffffffh
- Memory Device Handle 0012h
- Mem Array Mapped Adr Handle 0014h
- Partition Row Position 01
- Interleave Position 02
- Interleave Data Depth 02
- ========================== Dump #1: Extra #1 ===========================
- 4: kd> !verifier
- Verify Flags Level 0x00000000
- STANDARD FLAGS:
- [X] (0x00000000) Automatic Checks
- [ ] (0x00000001) Special pool
- [ ] (0x00000002) Force IRQL checking
- [ ] (0x00000008) Pool tracking
- [ ] (0x00000010) I/O verification
- [ ] (0x00000020) Deadlock detection
- [ ] (0x00000080) DMA checking
- [ ] (0x00000100) Security checks
- [ ] (0x00000800) Miscellaneous checks
- [ ] (0x00020000) DDI compliance checking
- ADDITIONAL FLAGS:
- [ ] (0x00000004) Randomized low resources simulation
- [ ] (0x00000200) Force pending I/O requests
- [ ] (0x00000400) IRP logging
- [ ] (0x00002000) Invariant MDL checking for stack
- [ ] (0x00004000) Invariant MDL checking for driver
- [ ] (0x00008000) Power framework delay fuzzing
- [ ] (0x00010000) Port/miniport interface checking
- [ ] (0x00040000) Systematic low resources simulation
- [ ] (0x00080000) DDI compliance checking (additional)
- [ ] (0x00200000) NDIS/WIFI verification
- [ ] (0x00800000) Kernel synchronization delay fuzzing
- [ ] (0x01000000) VM switch verification
- [ ] (0x02000000) Code integrity checks
- [X] Indicates flag is enabled
- Summary of All Verifier Statistics
- RaiseIrqls 0x0
- AcquireSpinLocks 0x0
- Synch Executions 0x0
- Trims 0x0
- Pool Allocations Attempted 0x0
- Pool Allocations Succeeded 0x0
- Pool Allocations Succeeded SpecialPool 0x0
- Pool Allocations With NO TAG 0x0
- Pool Allocations Failed 0x0
- Current paged pool allocations 0x0 for 00000000 bytes
- Peak paged pool allocations 0x0 for 00000000 bytes
- Current nonpaged pool allocations 0x0 for 00000000 bytes
- Peak nonpaged pool allocations 0x0 for 00000000 bytes
- ========================== Dump #1: Extra #2 ===========================
- 4: kd> !thread
- THREAD ffffe7840c38d040 Cid 0004.0188 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 4
- Not impersonating
- GetUlongFromAddress: unable to read from fffff80643e1143c
- Owning Process ffffe7840929e040 Image: System
- Attached Process N/A Image: N/A
- fffff78000000000: Unable to get shared data
- Wait Start TickCount 247202
- Context Switch Count 27859 IdealProcessor: 3
- ReadMemory error: Cannot get nt!KeMaximumIncrement value.
- UserTime 00:00:00.000
- KernelTime 00:00:00.000
- Win32 Start Address vsdatant (0xfffff8065984430c)
- Stack Init ffff9202e9ad7b90 Current ffff9202e9ad76f0
- Base ffff9202e9ad8000 Limit ffff9202e9ad1000 Call 0000000000000000
- Priority 8 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5
- Child-SP RetAddr : Args to Child : Call Site
- ffff9202`e9ad6d70 fffff806`46e4d458 : ffff9202`e9ad71d0 ffffe784`14d92010 00000000`00000000 ffffe784`14d92010 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x5c
- ffff9202`e9ad6e40 fffff806`46e4cad6 : ffffe784`09ec0014 fffff806`5be6c1f0 00000000`00000002 ffffe784`120ac9e0 : NETIO!StreamProcessCallout+0x3fc
- ffff9202`e9ad6f70 fffff806`46e4953b : 00000004`00000014 ffffe784`120ac9e0 ffffe784`15e6e1c0 ffff9202`e9ad7690 : NETIO!ProcessCallout+0x706
- ffff9202`e9ad70f0 fffff806`46e480da : ffffe784`16768760 ffffe784`09f47960 00000000`00000000 ffffe784`00000000 : NETIO!ArbitrateAndEnforce+0x71b
- ffff9202`e9ad7250 fffff806`46e9a02a : ffffe784`12fc8040 ffff9202`e9ad7711 ffffe784`132889b0 ffffe784`13e82d00 : NETIO!KfdClassify+0x37a
- ffff9202`e9ad7640 fffff806`46e99a4f : 00000000`00000000 ffff9202`e9ad77e1 00000000`000005a0 00000000`00000000 : NETIO!StreamInternalClassify+0x106
- ffff9202`e9ad7760 fffff806`46e9690b : 00000000`00000014 ffffe784`15e6e010 00000000`00000000 ffffe784`13e82da0 : NETIO!StreamInject+0x253
- ffff9202`e9ad7830 fffff806`4722a1fd : ffffe784`15e6e010 00000000`00000106 00000000`00000000 fffff806`00000001 : NETIO!FwppStreamInject+0x13b
- ffff9202`e9ad78c0 fffff806`5983c9cf : ffffe784`1620d5a0 00000000`000005a0 ffffe784`13e82da0 00000000`00000000 : fwpkclnt!FwpsStreamInjectAsync0+0xfd
- ffff9202`e9ad7920 ffffe784`1620d5a0 : 00000000`000005a0 ffffe784`13e82da0 00000000`00000000 00000000`00000106 : vsdatant+0xc9cf
- ffff9202`e9ad7928 00000000`000005a0 : ffffe784`13e82da0 00000000`00000000 00000000`00000106 00000000`00000014 : 0xffffe784`1620d5a0
- ffff9202`e9ad7930 ffffe784`13e82da0 : 00000000`00000000 00000000`00000106 00000000`00000014 fffff806`00000001 : 0x5a0
- ffff9202`e9ad7938 00000000`00000000 : 00000000`00000106 00000000`00000014 fffff806`00000001 ffffe784`13e82da0 : 0xffffe784`13e82da0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement